Sec Pro 10.5-6 Mobile Device Security and Management

Sec Pro 10.5-6 Mobile Device Security and Management

11th Grade

20 Qs

quiz-placeholder

Similar activities

C3 Mobile & Other Device Security

C3 Mobile & Other Device Security

10th - 12th Grade

23 Qs

Storage (1)

Storage (1)

12th Grade

20 Qs

Mobile Security

Mobile Security

University

20 Qs

ITS - Practice Test 2

ITS - Practice Test 2

9th - 12th Grade

25 Qs

Types of Computers

Types of Computers

11th - 12th Grade

20 Qs

CIW

CIW

9th - 12th Grade

15 Qs

Computer Network - Internet

Computer Network - Internet

10th - 12th Grade

20 Qs

Day 7 - Security I - 1st Review Quiz - Review of Day 6

Day 7 - Security I - 1st Review Quiz - Review of Day 6

University

15 Qs

Sec Pro 10.5-6 Mobile Device Security and Management

Sec Pro 10.5-6 Mobile Device Security and Management

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Ryan Sigmon

Used 4+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A software technician presents a forum on sideloading and jailbreaking to a group of new mobile users.

Which of the following points will the technician include in their discussion of the use of jailbreaking? (Select two.)

It is a method used to gain elevated privileges and access to system files on mobile devices.

It provides the ability to share internet connectivity to other devices.

It refers to the installation of applications from sources other than the official application store of the platform.

It does not undergo the same scrutiny and vetting process as those on official application stores.

It allows users to install unauthorized applications and customize device appearance and behavior.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following mobile device security considerations disables the ability to use the device after a short period of inactivity?

Screen lock

Remote wipe

GPS

TPM

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A cyber team presents a discussion on the use of sideloading and jailbreaking to a group of board members.

Which of the following BEST describes sideloading? (Select two.)

It provides the ability to share internet connectivity to other devices.

It is a method used to gain elevated privileges and access to system files on mobile devices.

It refers to the installation of applications from sources other than the official application store of the platform.

It does not undergo the same scrutiny and vetting process as those on official application stores.

It allows users to install unauthorized applications and customize device appearance and behavior.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

An IT security specialist at a mid-size corporation observes a trend of unauthorized apps appearing on company-provided mobile devices. The specialist suspects the employees are either sideloading apps or have jailbroken their devices.

What steps should the security specialist take to verify the cause of the unauthorized applications and to re-establish proper security protocols? (Select two.)

Purchase new mobile devices to replace all current ones.


Implement mobile device management (MDM) policies to restrict unauthorized application installation.


Implement a credential management policy.


Hire external IT consultants to manage mobile device usage.


Conduct device audits to identify unauthorized applications and to detect any signs of jailbreaking or sideloading.


5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A smartphone was lost at the airport. There is no way to recover the device.

Which of the following ensures data confidentiality on the device?

GPS

TPM

Screen lock

Remote wipe

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the recommend Intune configuration?


Account portal


Hybrid MDM


Company portal


Intune Standalone


7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a solution that pushes security policies directly to mobile devices over a network connection?


Credential Manager


Group Policy


Mobile device management (MDM)


Application Control


Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?